Abstract: Generalization is one of the most challenging issues
of Learning Classifier Systems. This feature depends on the
representation method which the system used. Considering the
proposed representation schemes for Learning Classifier System, it
can be concluded that many of them are designed to describe the
shape of the region which the environmental states belong and the
other relations of the environmental state with that region was
ignored. In this paper, we propose a new representation scheme
which is designed to show various relationships between the
environmental state and the region that is specified with a particular
classifier.
Abstract: In this paper we introduce some subspaces of fuzzy entire sequence space. Some general properties of these sequence spaces are discussed. Also some inclusion relation involving the spaces are obtained. Mathematics Subject Classification: 40A05, 40D25.
Abstract: Business Process Reengineering (BPR) is an essential tool before an information system project implementation. Enterprise Resource Planning (ERP) projects definitely require the standardization and fixation of business processes from customer order to shipment. Therefore, ERP implementations are well proven to be coupled with BPR, although the extend and timing of BPR with respect to ERP implementation differ. This study aims at analyzing the effects of BPR on ERP implementation success. Basing on two Turkish ERP implementations in pharmaceutical sector, a comparative study is performed. One of the ERP implementations took place after a BPR implementation, whereas the other implementation was without a prior BPR application. Both implementations have been realized with the same consultant team, the case with prior BPR implementation going live first. The results of the case study reveal that if business processes are not optimized and improved before an ERP implementation, ERP live system would face with disharmony problems of processes and processes automated by ERP. This suggests a definite precedence relationship between BPR and ERP applications
Abstract: This paper proposes a model of adding relations between
members of the same level in a pyramid organization structure
which is a complete K-ary tree such that the communication of
information between every member in the organization becomes the
most efficient. When edges between one node and every other node
with the same depth N in a complete K-ary tree of height H are
added, an optimal depth N* = H is obtained by minimizing the total
path length which is the sum of lengths of shortest paths between
every pair of all nodes.
Abstract: The technique of k-anonymization has been proposed to obfuscate private data through associating it with at least k identities. This paper investigates the basic tabular structures that
underline the notion of k-anonymization using cell suppression.
These structures are studied under idealized conditions to identify the
essential features of the k-anonymization notion. We optimize data kanonymization
through requiring a minimum number of anonymized
values that are balanced over all columns and rows. We study the
relationship between the sizes of the anonymized tables, the value k, and the number of attributes. This study has a theoretical value through contributing to develop a mathematical foundation of the kanonymization
concept. Its practical significance is still to be
investigated.
Abstract: This paper regards the phenomena of intensive suburbanization and urbanization in Olomouc city and in Olomouc region in general for the period of 1986–2009. A Remote Sensing approach that involves tracking of changes in Land Cover units is proposed to quantify the urbanization state and trends in temporal and spatial aspects. It actually consisted of two approaches, Experiment 1 and Experiment 2 which implied two different image classification solutions in order to provide Land Cover maps for each 1986–2009 time split available in the Landsat image set. Experiment 1 dealt with the unsupervised classification, while Experiment 2 involved semi- supervised classification, using a combination of object-based and pixel-based classifiers. The resulting Land Cover maps were subsequently quantified for the proportion of urban area unit and its trend through time, and also for the urban area unit stability, yielding the relation of spatial and temporal development of the urban area unit. Some outcomes seem promising but there is indisputably room for improvements of source data and also processing and filtering.
Abstract: Accurate software cost estimates are critical to both
developers and customers. They can be used for generating request
for proposals, contract negotiations, scheduling, monitoring and
control. The exact relationship between the attributes of the effort
estimation is difficult to establish. A neural network is good at
discovering relationships and pattern in the data. So, in this paper a
comparative analysis among existing Halstead Model, Walston-Felix
Model, Bailey-Basili Model, Doty Model and Neural Network
Based Model is performed. Neural Network has outperformed the
other considered models. Hence, we proposed Neural Network
system as a soft computing approach to model the effort estimation
of the software systems.
Abstract: The main purpose of this study is to analyze climbers
involved in motivation and risk perception and analysis of the
predictive ability of the risk perception "mountaineering" involved in
motivation. This study used questionnaires, to have to climb the
3000m high mountain in Taiwan climbers object to carry out an
investigation in order to non-random sampling, a total of 231 valid
questionnaires were. After statistical analysis, the study found that: 1.
Climbers the highest climbers involved in motivation "to enjoy the
natural beauty of the fun. 2 climbers for climbers "risk perception" the
highest: the natural environment of risk. 3. Climbers “seeking
adventure stimulate", “competence achievement" motivation highly
predictive of risk perception. Based on these findings, this study not
only practices the recommendations of the outdoor leisure industry,
and also related research proposals for future researchers.
Abstract: The purpose of this paper is to propose a text mining
approach to evaluate companies- practices on affective management.
Affective management argues that it is critical to take stakeholders-
affects into consideration during decision-making process, along with
the traditional numerical and rational indices. CSR reports published
by companies were collected as source information. Indices were
proposed based on the frequency and collocation of words relevant to
affective management concept using text mining approach to analyze
the text information of CSR reports. In addition, the relationships
between the results obtained using proposed indices and traditional
indicators of business performance were investigated using
correlation analysis. Those correlations were also compared between
manufacturing and non-manufacturing companies. The results of this
study revealed the possibility to evaluate affective management
practices of companies based on publicly available text documents.
Abstract: Air pollution is still considered as one of the major
environmental and health issues. There is enough research evidence
to show a strong relationship between exposure to air contaminants
and respiratory illnesses among children and adults. In this paper we
used the Copula approach to study a potential relationship between
selected air pollutants (PM10 and NO2) and hospital admissions for
respiratory diseases. Kendall-s tau and Spearman-s rho rank
correlation coefficients are calculated and used in Copula method.
This paper demonstrates that copulas can be used to provide
additional information as a measure of an association when compared
to the standard correlation coefficients. The results find a significant
correlation between the selected air pollutants and hospital
admissions for most of the selected respiratory illnesses.
Abstract: The objective of this experiment was to study of water
relations and chlorophyll in different wheat genotypes and their
correlations with grain and biological yields. 21 genotypes of bread
wheat were compared in a field experiment as randomized complete
blocks design with four replications. The results showed that relative
water deficit, relative water loss, excised leaf water retention, cell
membrane stability, chlorophyll-a, chlorophyll-b, total chlorophyll,
grain yield and biological yield were different significantly among
wheat genotypes, but SPAD-chlorophyll index, relative water content
and chlorophyll florescence were not. Significant correlations were
not observed among above mentioned water relations and
chlorophyll characteristics with grain yield, but there was a positive
and significant correlation between biological yield and grain yield.
Abstract: Retrieval of the surface reflectance is important in the
remotely sensed data analysis to obtain the atmospheric reflectance or
atmospheric correction. The relationship between visible and mid
infrared reflectance over land was investigated and developed in this
study. The surface reflectances of the two visible bands were
measured using a handheld spectroradiometer collected around
Penang Island. In this study, we use the assumption that the 2.1 μm
band is not affected by aerosol and it is transparent to most aerosol
types (except dust). Therefore the satellite observed signal is the
same as the surface signal in 2.1 μm band. The correlation between
the surface reflectance measured by the spectroradiometer in the blue
and red region and the 2.1 μm observed by the satellite has been
established. We investigate five dates of Landsat TM scenes in this
study. The finding obtained by this study indicates that the surface
reflectance can be retrieved from the 2.1 μm band.
Abstract: The most important property of the Gene Ontology is
the terms. These control vocabularies are defined to provide
consistent descriptions of gene products that are shareable and
computationally accessible by humans, software agent, or other
machine-readable meta-data. Each term is associated with
information such as definition, synonyms, database references, amino
acid sequences, and relationships to other terms. This information has
made the Gene Ontology broadly applied in microarray and
proteomic analysis. However, the process of searching the terms is
still carried out using traditional approach which is based on keyword
matching. The weaknesses of this approach are: ignoring semantic
relationships between terms, and highly depending on a specialist to
find similar terms. Therefore, this study combines semantic similarity
measure and genetic algorithm to perform a better retrieval process
for searching semantically similar terms. The semantic similarity
measure is used to compute similitude strength between two terms.
Then, the genetic algorithm is employed to perform batch retrievals
and to handle the situation of the large search space of the Gene
Ontology graph. The computational results are presented to show the
effectiveness of the proposed algorithm.
Abstract: The main objectives of this study were to identify
attributes that influence customer satisfaction and determine their
relationships with customer satisfaction. The variables included in
this research are place/ambience, food quality and service quality as
independent variables and customer satisfaction as the dependent
variable. A survey questionnaire which consisted of three parts to
measure demographic factors, independent variables, and dependent
variables was constructed based on items determined by past
research. 149 respondents from one of the well known hotel in Kuala
Lumpur, MALAYSIA were selected as a sample. Psychometric
testing was conducted to determine the reliability and validity of the
questionnaire. From the findings, there were positive significant
relationship between place/ambience (r=0.563**, p=0.000) and
service quality (r=0.544**, p=0.000) with customer satisfaction.
However, although relationship between food quality and customer
satisfaction was significant, it was in the negative direction (r=-
0.268**, p=0.001). New findings were discovered after conducting
this research and previous research findings were strengthened by the
results of this research. Future researchers could concentrate on
determining attributes that influence customer satisfaction when
cost/price is not a factor and reasons for place/ambience is currently
becoming the leading factor in determining customer satisfaction.
Abstract: The multiindex Mittag-Leffler (M-L) function and the multiindex Dzrbashjan-Gelfond-Leontiev (D-G-L) differentiation and integration play a very pivotal role in the theory and applications of generalized fractional calculus. The object of this paper is to investigate the relations that exist between the Riemann-Liouville fractional calculus and multiindex Dzrbashjan-Gelfond-Leontiev differentiation and integration with multiindex Mittag-Leffler function.
Abstract: This paper presents a new approach in the identification of the quadrotor dynamic model using a black-box system for identification. Also the paper considers the problems which appear during the identification in the closed-loop and offers a technical solution for overcoming the correlation between the input noise present in the output
Abstract: In data mining, the association rules are used to search
for the relations of items of the transactions database. Following the
data is collected and stored, it can find rules of value through
association rules, and assist manager to proceed marketing strategy
and plan market framework. In this paper, we attempt fuzzy partition
methods and decide membership function of quantitative values of
each transaction item. Also, by managers we can reflect the
importance of items as linguistic terms, which are transformed as
fuzzy sets of weights. Next, fuzzy weighted frequent pattern growth
(FWFP-Growth) is used to complete the process of data mining. The
method above is expected to improve Apriori algorithm for its better
efficiency of the whole association rules. An example is given to
clearly illustrate the proposed approach.
Abstract: In this work, new experimental data for slugging
frequency in inclined gas-liquid flow are reported, and a new
correlation is proposed. Scale experiments were carried out using a
mixture of air and water in a 6 m long pipe. Two different pipe
diameters were used, namely, 38 and 67 mm. The data were taken
with capacitance type sensors at a data acquisition frequency of 200
Hz over an interval of 60 seconds. For the range of flow conditions
studied, the liquid superficial velocity is observed to influence the
frequency strongly. A comparison of the present data with
correlations available in the literature reveals a lack of agreement. A
new correlation for slug frequency has been proposed for the inclined
flow, which represents the main contribution of this work.
Abstract: Using the idea of prime and semiprime bi-ideals of
rings, the concept of prime and semiprime generalized bi-ideals of
rings is introduced, which is an extension of the concept of prime and
semiprime bi-ideals of rings and some interesting characterizations
of prime and semiprime generalized bi-ideals are obtained. Also,
we give the relationship between the Baer radical and prime and
semiprime generalized bi-ideals of rings in the same way as of biideals
of rings which was studied by Roux.
Abstract: At present, dictionary attack has been the basic tool for
recovering key passwords. In order to avoid dictionary attack, users
purposely choose another character strings as passwords. According to
statistics, about 14% of users choose keys on a keyboard (Kkey, for
short) as passwords. This paper develops a framework system to attack
the password chosen from Kkeys and analyzes its efficiency. Within
this system, we build up keyboard rules using the adjacent and parallel
relationship among Kkeys and then use these Kkey rules to generate
password databases by depth-first search method. According to the
experiment results, we find the key space of databases derived from
these Kkey rules that could be far smaller than the password databases
generated within brute-force attack, thus effectively narrowing down
the scope of attack research. Taking one general Kkey rule, the
combinations in all printable characters (94 types) with Kkey adjacent
and parallel relationship, as an example, the derived key space is about
240 smaller than those in brute-force attack. In addition, we
demonstrate the method's practicality and value by successfully
cracking the access password to UNIX and PC using the password
databases created